CVE-2025-60020
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-60020 affects NNCP (Node to Node Copy Program) versions before 8.12.0. The vulnerability was discovered by Eugene Medvedev and disclosed on September 19, 2025. This security flaw allows path traversal attacks during freqing and file saving operations via crafted path in packet data. The vulnerability affects the freq and file commands in NNCP, a package that facilitates secure store-and-forward file and mail exchange (Debian Security, NNCP Devel).

Technical details

The vulnerability exists in NNCP's handling of paths in freq and file functions. Despite the requirement for both functions to supply full paths in configuration, the affected versions accept and process paths containing '..' sequences. The vulnerability has a CVSS score of 6.0 (AV:N/AC:L/Au:S/C:P/I:P/A:N), indicating moderate severity with partial confidentiality and integrity impacts (Rapid7).

Impact

The vulnerability allows attackers to perform path traversal attacks that can access files outside the intended directories. An attacker could potentially request any file that NNCP has access to, including sensitive files such as configuration files containing private keys. Additionally, sent files can break out of the incoming directory and be written to any location where the user has write permissions (NNCP Devel).

Mitigation and workarounds

The vulnerability has been fixed in NNCP version 8.12.0 and later. For Debian systems, fixes have been released in version 8.8.2-3+deb12u1 for oldstable (bookworm) and version 8.11.0-4+deb13u1 for stable (trixie) distributions. Users are recommended to upgrade their NNCP packages to the patched versions (Debian Security).

Community reactions

The vulnerability was responsibly disclosed through the NNCP development mailing list, where it received immediate attention from the maintainers. The NNCP maintainer Sergey Matveev acknowledged the issue and quickly merged the fix into the develop branch. The Debian security team also responded promptly by issuing security updates for affected distributions (NNCP Devel).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59030HIGH7.5
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-59029MEDIUM5.3
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management